Free

Mobile Security Fundamentals

In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.
0
31
M
Time
beginner
difficulty
1
ceu/cpe

Course Content

Mobile Security Basic Architecture

8m

Mobile Security Fundamentals
Mobile Security Defense

7m

Mobile Security Fundamentals
Mobile Offensive (IOS) Part 1

11m

Mobile Security Fundamentals
Mobile Offensive (Android) Part 2

4m

Mobile Security Fundamentals
Course Description

In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into depth about code signing, sandbox, and exploit mitigations. In addition to recognizing & scanning vulnerabilities, secure boot chain is explained through tools such as Wondershare & Kingo.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Ken Underhill

I'm a cybersecurity professional who has worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Mobile Security Fundamentals Certificate of Completion